Category: Featured

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Aviatrix Controller vulnerability

Cybersecurity Threat Advisory: Aviatrix Controller vulnerability

A critical security vulnerability in the Aviatrix Controller cloud networking platform has been discovered and is actively exploited by threat actors to deploy backdoors and cryptocurrency miners. Multiple cloud deployments have reported that they have been compromised following this disclosure....

/ January 15, 2025
2024
2024 by the numbers

2024 by the numbers

The threat landscape is always churning, with new threats emerging while others disappear or fade to irrelevance. Consider ALPHV, a ransomware-as-a-service (RaaS) group that provided the infrastructure, tools, and administrative services to the individual hacker who ransomed $22 million from Change Healthcare...

/ January 14, 2025
insider threats
Insider threats expected to persist in 2025

Insider threats expected to persist in 2025

SmarterMSP.com recently covered the topic of insider threats, but many experts continue to point to these types of threats as one of the biggest cybersecurity challenges impacting organizations in 2025. The Hacker News, for instance, says: Insider threats are expected...

/ January 14, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of Ivanti’s Connect Secure VPN

Cybersecurity Threat Advisory: Active exploitation of Ivanti’s Connect Secure VPN

A critical Ivanti Connect Secure VPN vulnerability, identified as CVE-2025-0282, was disclosed. Threat actors are actively exploiting it in the wild, primarily targeting organizations relying on Ivanti’s Zero Trust Access (ZTA) solutions. Review this Cybersecurity Threat Advisory to see how...

/ January 13, 2025
Pioneers in Tech
Pioneers in Tech: Peter de Jager, the oracle of Y2K

Pioneers in Tech: Peter de Jager, the oracle of Y2K

On page 115 of the Sept. 6, 1993, issue of Computerworld, a Canadian computer consultant named Peter de Jager launched an industry: responding to Y2K. Learn more about De Jager in this edition of Pioneers in Tech. De Jager warned:...

/ January 10, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerabilities in SonicWall

Cybersecurity Threat Advisory: Critical vulnerabilities in SonicWall

SonicWall disclosed three critical vulnerabilities affecting the SonicOS firmware. These flaws include an authentication bypass affecting the SSL VPN and SSH management interfaces, which can enable attackers unauthorized access upon successful exploitation. Continue reading this Cybersecurity Threat Advisory for more...

/ January 10, 2025
Ask an MSP Expert
Ask an MSP Expert: Unlocking the power of AI for marketing

Ask an MSP Expert: Unlocking the power of AI for marketing

As managed service providers (MSPs) continue to explore the potential of artificial intelligence (AI), many are asking the innovative ways they can integrate AI into their operations. Logan Ochitwa and Andrew Down from Vendasta recently shared valuable insights in a...

/ January 10, 2025
Top 5 marketing opportunities for MSPs in 2025

Top 5 marketing opportunities for MSPs in 2025

As we enter 2025, it’s the perfect time for managed service providers (MSPs) to reflect on their marketing strategies. This past year has brought many lessons, and while we’ve seen some marketing efforts have hit the mark, others have fallen...

/ January 9, 2025
It is time for MSPs to embrace agentic artificial intelligence (AI)

It is time for MSPs to embrace agentic artificial intelligence (AI)

I am willing to bet that almost every managed service provider (MSP) will, or at the very least, experiment with agentic AI in 2025. Rapid advances of large language models (LLMs) to probabilistically manage tasks have led IT vendors, IT...

/ January 8, 2025
email security
AI-powered email security: How AI enhances integrated cloud email security

AI-powered email security: How AI enhances integrated cloud email security

Barracuda recently launched new email protection plans that enable customers to fully defend their email environments with security tailored to their specific needs. Our first post in this series defined and explained the components necessary to defend against modern threats. In this post,...

/ January 8, 2025